Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
Typedeb
Namespacedebian
Namecups
Version2.2.1-8+deb9u6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.4.17-1
Latest_non_vulnerable_version2.4.17-1
Affected_by_vulnerabilities
0
url VCID-2chf-23mc-d3dn
vulnerability_id VCID-2chf-23mc-d3dn
summary cups: access to uninitialized buffer in ipp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10001
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24831
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24911
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24951
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24726
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24793
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24838
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24852
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24813
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24756
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24767
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24759
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1921680
reference_id 1921680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1921680
4
reference_url https://security.archlinux.org/ASA-202102-13
reference_id ASA-202102-13
reference_type
scores
url https://security.archlinux.org/ASA-202102-13
5
reference_url https://security.archlinux.org/AVG-1529
reference_id AVG-1529
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1529
6
reference_url https://access.redhat.com/errata/RHSA-2021:4393
reference_id RHSA-2021:4393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4393
7
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
8
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2020-10001
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn
1
url VCID-3etj-2m21-ffa1
vulnerability_id VCID-3etj-2m21-ffa1
summary cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58364
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.30003
published_at 2026-04-04T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29955
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31552
published_at 2026-04-18T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32467
published_at 2026-04-11T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32439
published_at 2026-04-16T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-13T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32429
published_at 2026-04-12T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32388
published_at 2026-04-07T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32436
published_at 2026-04-08T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32463
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2393078
reference_id 2393078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2393078
5
reference_url https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d
reference_id e58cba9d6fceed4242980e51dbd1302cf638ab1d
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/
url https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d
6
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4
reference_id GHSA-7qx3-r744-6qv4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4
7
reference_url https://access.redhat.com/errata/RHSA-2025:15700
reference_id RHSA-2025:15700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15700
8
reference_url https://access.redhat.com/errata/RHSA-2025:15701
reference_id RHSA-2025:15701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15701
9
reference_url https://access.redhat.com/errata/RHSA-2025:16590
reference_id RHSA-2025:16590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16590
10
reference_url https://access.redhat.com/errata/RHSA-2025:16591
reference_id RHSA-2025:16591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16591
11
reference_url https://access.redhat.com/errata/RHSA-2025:16592
reference_id RHSA-2025:16592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16592
12
reference_url https://access.redhat.com/errata/RHSA-2025:22063
reference_id RHSA-2025:22063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22063
13
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
14
reference_url https://usn.ubuntu.com/7745-1/
reference_id USN-7745-1
reference_type
scores
url https://usn.ubuntu.com/7745-1/
fixed_packages
0
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9
aliases CVE-2025-58364
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1
2
url VCID-44ju-8618-vqht
vulnerability_id VCID-44ju-8618-vqht
summary A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8842
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-16T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57528
published_at 2026-04-01T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57612
published_at 2026-04-02T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57633
published_at 2026-04-04T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57609
published_at 2026-04-07T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57663
published_at 2026-04-08T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57667
published_at 2026-04-18T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57682
published_at 2026-04-11T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57661
published_at 2026-04-12T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8842
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
4
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-8842
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht
3
url VCID-6mus-21kz-uuhz
vulnerability_id VCID-6mus-21kz-uuhz
summary cups: Session cookie generated by the CUPS web interface is easy to guess
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4300
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59268
published_at 2026-04-18T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59226
published_at 2026-04-13T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59263
published_at 2026-04-16T12:55:00Z
3
value 0.00492
scoring_system epss
scoring_elements 0.65554
published_at 2026-04-01T12:55:00Z
4
value 0.00492
scoring_system epss
scoring_elements 0.65602
published_at 2026-04-02T12:55:00Z
5
value 0.00492
scoring_system epss
scoring_elements 0.65632
published_at 2026-04-04T12:55:00Z
6
value 0.00492
scoring_system epss
scoring_elements 0.65598
published_at 2026-04-07T12:55:00Z
7
value 0.00492
scoring_system epss
scoring_elements 0.65649
published_at 2026-04-08T12:55:00Z
8
value 0.00492
scoring_system epss
scoring_elements 0.65662
published_at 2026-04-09T12:55:00Z
9
value 0.00492
scoring_system epss
scoring_elements 0.65682
published_at 2026-04-11T12:55:00Z
10
value 0.00492
scoring_system epss
scoring_elements 0.65668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4300
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/apple/cups/releases/tag/v2.2.10
reference_id
reference_type
scores
url https://github.com/apple/cups/releases/tag/v2.2.10
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html
6
reference_url http://www.securityfocus.com/bid/107785
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107785
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695929
reference_id 1695929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695929
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909
reference_id 915909
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4300
reference_id CVE-2018-4300
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-4300
11
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4300
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz
4
url VCID-7wg4-sc9v-bffk
vulnerability_id VCID-7wg4-sc9v-bffk
summary cups: Information leak through Cups-Get-Document operation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32360
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20097
published_at 2026-04-02T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20017
published_at 2026-04-09T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20037
published_at 2026-04-11T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19992
published_at 2026-04-12T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19934
published_at 2026-04-13T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-04T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19884
published_at 2026-04-07T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19963
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953
reference_id 1051953
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230495
reference_id 2230495
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230495
6
reference_url https://support.apple.com/en-us/HT213758
reference_id HT213758
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://support.apple.com/en-us/HT213758
7
reference_url https://support.apple.com/en-us/HT213759
reference_id HT213759
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://support.apple.com/en-us/HT213759
8
reference_url https://support.apple.com/en-us/HT213760
reference_id HT213760
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://support.apple.com/en-us/HT213760
9
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
10
reference_url https://access.redhat.com/errata/RHSA-2023:4765
reference_id RHSA-2023:4765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4765
11
reference_url https://access.redhat.com/errata/RHSA-2023:4766
reference_id RHSA-2023:4766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4766
12
reference_url https://access.redhat.com/errata/RHSA-2023:4768
reference_id RHSA-2023:4768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4768
13
reference_url https://access.redhat.com/errata/RHSA-2023:4769
reference_id RHSA-2023:4769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4769
14
reference_url https://access.redhat.com/errata/RHSA-2023:4770
reference_id RHSA-2023:4770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4770
15
reference_url https://access.redhat.com/errata/RHSA-2023:4771
reference_id RHSA-2023:4771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4771
16
reference_url https://access.redhat.com/errata/RHSA-2023:4838
reference_id RHSA-2023:4838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4838
17
reference_url https://access.redhat.com/errata/RHSA-2023:4864
reference_id RHSA-2023:4864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4864
18
reference_url https://usn.ubuntu.com/6361-1/
reference_id USN-6361-1
reference_type
scores
url https://usn.ubuntu.com/6361-1/
19
reference_url https://usn.ubuntu.com/6361-2/
reference_id USN-6361-2
reference_type
scores
url https://usn.ubuntu.com/6361-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-32360
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk
5
url VCID-993k-m3sq-gufu
vulnerability_id VCID-993k-m3sq-gufu
summary cups: Authentication Bypass in CUPS Authorization Handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58060
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15401
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16395
published_at 2026-04-18T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16551
published_at 2026-04-09T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-11T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16494
published_at 2026-04-12T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16436
published_at 2026-04-13T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16376
published_at 2026-04-16T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16411
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16496
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58060
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392595
reference_id 2392595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392595
5
reference_url https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221
reference_id 595d691075b1d396d2edfaa0a8fd0873a0a1f221
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/
url https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221
6
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq
reference_id GHSA-4c68-qgrh-rmmq
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq
7
reference_url https://access.redhat.com/errata/RHSA-2025:15700
reference_id RHSA-2025:15700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15700
8
reference_url https://access.redhat.com/errata/RHSA-2025:15701
reference_id RHSA-2025:15701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15701
9
reference_url https://access.redhat.com/errata/RHSA-2025:15702
reference_id RHSA-2025:15702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15702
10
reference_url https://access.redhat.com/errata/RHSA-2025:16590
reference_id RHSA-2025:16590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16590
11
reference_url https://access.redhat.com/errata/RHSA-2025:16591
reference_id RHSA-2025:16591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16591
12
reference_url https://access.redhat.com/errata/RHSA-2025:16592
reference_id RHSA-2025:16592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16592
13
reference_url https://access.redhat.com/errata/RHSA-2025:17049
reference_id RHSA-2025:17049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17049
14
reference_url https://access.redhat.com/errata/RHSA-2025:17054
reference_id RHSA-2025:17054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17054
15
reference_url https://access.redhat.com/errata/RHSA-2025:17141
reference_id RHSA-2025:17141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17141
16
reference_url https://access.redhat.com/errata/RHSA-2025:17144
reference_id RHSA-2025:17144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17144
17
reference_url https://access.redhat.com/errata/RHSA-2025:17164
reference_id RHSA-2025:17164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17164
18
reference_url https://access.redhat.com/errata/RHSA-2026:0934
reference_id RHSA-2026:0934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0934
19
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
20
reference_url https://usn.ubuntu.com/7745-1/
reference_id USN-7745-1
reference_type
scores
url https://usn.ubuntu.com/7745-1/
fixed_packages
0
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9
aliases CVE-2025-58060
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu
6
url VCID-am36-6m5v-fkba
vulnerability_id VCID-am36-6m5v-fkba
summary cups: libppd: remote command injection via attacker controlled data in PPD file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47175
reference_id
reference_type
scores
0
value 0.33103
scoring_system epss
scoring_elements 0.96909
published_at 2026-04-18T12:55:00Z
1
value 0.33103
scoring_system epss
scoring_elements 0.96878
published_at 2026-04-04T12:55:00Z
2
value 0.33103
scoring_system epss
scoring_elements 0.96883
published_at 2026-04-07T12:55:00Z
3
value 0.33103
scoring_system epss
scoring_elements 0.96891
published_at 2026-04-08T12:55:00Z
4
value 0.33103
scoring_system epss
scoring_elements 0.96893
published_at 2026-04-09T12:55:00Z
5
value 0.33103
scoring_system epss
scoring_elements 0.96895
published_at 2026-04-11T12:55:00Z
6
value 0.33103
scoring_system epss
scoring_elements 0.96897
published_at 2026-04-12T12:55:00Z
7
value 0.33103
scoring_system epss
scoring_elements 0.96898
published_at 2026-04-13T12:55:00Z
8
value 0.33103
scoring_system epss
scoring_elements 0.96905
published_at 2026-04-16T12:55:00Z
9
value 0.33659
scoring_system epss
scoring_elements 0.96918
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314256
reference_id 2314256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314256
5
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
6
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
7
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
8
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
9
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
10
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
11
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
12
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
13
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
14
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
15
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
16
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
17
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
18
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
19
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
20
reference_url https://access.redhat.com/errata/RHSA-2024:9470
reference_id RHSA-2024:9470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9470
21
reference_url https://access.redhat.com/errata/RHSA-2025:0083
reference_id RHSA-2025:0083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0083
22
reference_url https://usn.ubuntu.com/7041-1/
reference_id USN-7041-1
reference_type
scores
url https://usn.ubuntu.com/7041-1/
23
reference_url https://usn.ubuntu.com/7041-2/
reference_id USN-7041-2
reference_type
scores
url https://usn.ubuntu.com/7041-2/
24
reference_url https://usn.ubuntu.com/7041-3/
reference_id USN-7041-3
reference_type
scores
url https://usn.ubuntu.com/7041-3/
25
reference_url https://usn.ubuntu.com/7045-1/
reference_id USN-7045-1
reference_type
scores
url https://usn.ubuntu.com/7045-1/
26
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
purl pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63fa-a4pr-wqh3
1
vulnerability VCID-b1yf-xuc1-ykak
2
vulnerability VCID-dx89-e1nn-w7gz
3
vulnerability VCID-hc4t-becn-rkcc
4
vulnerability VCID-jy1y-e1nk-p3b4
5
vulnerability VCID-r1q4-2dq2-33ca
6
vulnerability VCID-ry9y-z4e4-yfdh
7
vulnerability VCID-vgtp-sjtt-73e9
8
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9
aliases CVE-2024-47175
risk_score 10.0
exploitability 2.0
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba
7
url VCID-apyh-1uza-pffa
vulnerability_id VCID-apyh-1uza-pffa
summary In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2228
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28106
published_at 2026-04-01T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28179
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28222
published_at 2026-04-04T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28017
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28084
published_at 2026-04-08T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28128
published_at 2026-04-09T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28134
published_at 2026-04-11T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28091
published_at 2026-04-12T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28033
published_at 2026-04-13T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28043
published_at 2026-04-16T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28026
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2228
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782
reference_id 946782
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782
3
reference_url https://usn.ubuntu.com/4340-1/
reference_id USN-4340-1
reference_type
scores
url https://usn.ubuntu.com/4340-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-2228
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa
8
url VCID-aznw-8yer-xfhf
vulnerability_id VCID-aznw-8yer-xfhf
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34241
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09741
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09686
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.0979
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09768
published_at 2026-04-13T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09785
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09816
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09807
published_at 2026-04-09T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09757
published_at 2026-04-08T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10737
published_at 2026-04-16T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/06/26/1
reference_id 1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url http://www.openwall.com/lists/oss-security/2023/06/26/1
5
reference_url http://www.openwall.com/lists/oss-security/2023/06/23/10
reference_id 10
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url http://www.openwall.com/lists/oss-security/2023/06/23/10
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885
reference_id 1038885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2214914
reference_id 2214914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2214914
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
reference_id 7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/
9
reference_url https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
reference_id 9809947a959e18409dcf562a3466ef246cb90cb2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
reference_id GHSA-qjgh-5hcq-5f25
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25
11
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
12
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213843
13
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213844
14
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://support.apple.com/kb/HT213845
15
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html
16
reference_url https://access.redhat.com/errata/RHSA-2023:6596
reference_id RHSA-2023:6596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6596
17
reference_url https://access.redhat.com/errata/RHSA-2023:7165
reference_id RHSA-2023:7165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7165
18
reference_url https://access.redhat.com/errata/RHSA-2024:1101
reference_id RHSA-2024:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1101
19
reference_url https://access.redhat.com/errata/RHSA-2024:1409
reference_id RHSA-2024:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1409
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
reference_id TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/
21
reference_url https://usn.ubuntu.com/6184-1/
reference_id USN-6184-1
reference_type
scores
url https://usn.ubuntu.com/6184-1/
22
reference_url https://usn.ubuntu.com/6184-2/
reference_id USN-6184-2
reference_type
scores
url https://usn.ubuntu.com/6184-2/
23
reference_url https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
reference_id v2.4.6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/
url https://github.com/OpenPrinting/cups/releases/tag/v2.4.6
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-34241
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf
9
url VCID-bzht-vhe3-y7bf
vulnerability_id VCID-bzht-vhe3-y7bf
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4180
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30171
published_at 2026-04-18T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30176
published_at 2026-04-13T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.3019
published_at 2026-04-16T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40864
published_at 2026-04-01T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40946
published_at 2026-04-02T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-11T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.409
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.4095
published_at 2026-04-08T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40957
published_at 2026-04-09T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40939
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
8
reference_url https://support.apple.com/HT208849
reference_id
reference_type
scores
url https://support.apple.com/HT208849
9
reference_url https://www.debian.org/security/2018/dsa-4243
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4243
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607282
reference_id 1607282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607282
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4180
reference_id CVE-2018-4180
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-4180
18
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
19
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
20
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4180
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf
10
url VCID-ev9c-v5dv-37fb
vulnerability_id VCID-ev9c-v5dv-37fb
summary cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-3898
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37102
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37269
published_at 2026-04-02T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37296
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37125
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37177
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.3719
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37201
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37167
published_at 2026-04-18T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.3714
published_at 2026-04-13T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37185
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-3898
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1823964
reference_id 1823964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1823964
5
reference_url https://access.redhat.com/errata/RHSA-2020:4469
reference_id RHSA-2020:4469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4469
6
reference_url https://usn.ubuntu.com/4340-1/
reference_id USN-4340-1
reference_type
scores
url https://usn.ubuntu.com/4340-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2020-3898
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb
11
url VCID-fkyp-m1p9-mfhy
vulnerability_id VCID-fkyp-m1p9-mfhy
summary cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18248
reference_id
reference_type
scores
0
value 0.01002
scoring_system epss
scoring_elements 0.76945
published_at 2026-04-01T12:55:00Z
1
value 0.01002
scoring_system epss
scoring_elements 0.76951
published_at 2026-04-02T12:55:00Z
2
value 0.01002
scoring_system epss
scoring_elements 0.7698
published_at 2026-04-04T12:55:00Z
3
value 0.01002
scoring_system epss
scoring_elements 0.76962
published_at 2026-04-07T12:55:00Z
4
value 0.01002
scoring_system epss
scoring_elements 0.76994
published_at 2026-04-08T12:55:00Z
5
value 0.01002
scoring_system epss
scoring_elements 0.77006
published_at 2026-04-09T12:55:00Z
6
value 0.01002
scoring_system epss
scoring_elements 0.77034
published_at 2026-04-11T12:55:00Z
7
value 0.01002
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-12T12:55:00Z
8
value 0.01002
scoring_system epss
scoring_elements 0.77009
published_at 2026-04-13T12:55:00Z
9
value 0.01002
scoring_system epss
scoring_elements 0.7705
published_at 2026-04-16T12:55:00Z
10
value 0.01002
scoring_system epss
scoring_elements 0.77052
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18248
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1561296
reference_id 1561296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1561296
5
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-18248
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy
12
url VCID-k4yw-jg6v-1bcc
vulnerability_id VCID-k4yw-jg6v-1bcc
summary cups: Cupsd Listen arbitrary chmod 0140777
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35235
reference_id
reference_type
scores
0
value 0.03102
scoring_system epss
scoring_elements 0.86826
published_at 2026-04-18T12:55:00Z
1
value 0.03102
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-02T12:55:00Z
2
value 0.03102
scoring_system epss
scoring_elements 0.86776
published_at 2026-04-04T12:55:00Z
3
value 0.03102
scoring_system epss
scoring_elements 0.86773
published_at 2026-04-07T12:55:00Z
4
value 0.03102
scoring_system epss
scoring_elements 0.86793
published_at 2026-04-08T12:55:00Z
5
value 0.03102
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-09T12:55:00Z
6
value 0.03102
scoring_system epss
scoring_elements 0.86815
published_at 2026-04-11T12:55:00Z
7
value 0.03102
scoring_system epss
scoring_elements 0.86811
published_at 2026-04-12T12:55:00Z
8
value 0.03102
scoring_system epss
scoring_elements 0.86807
published_at 2026-04-13T12:55:00Z
9
value 0.03102
scoring_system epss
scoring_elements 0.86822
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/06/11/1
reference_id 1
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url http://www.openwall.com/lists/oss-security/2024/06/11/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002
reference_id 1073002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2290318
reference_id 2290318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2290318
7
reference_url http://www.openwall.com/lists/oss-security/2024/06/12/4
reference_id 4
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url http://www.openwall.com/lists/oss-security/2024/06/12/4
8
reference_url http://www.openwall.com/lists/oss-security/2024/06/12/5
reference_id 5
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url http://www.openwall.com/lists/oss-security/2024/06/12/5
9
reference_url https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
reference_id ff1f8a623e090dee8a8aadf12a6a4b25efac143d
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
reference_id GHSA-vvwp-mv6j-hw6f
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
11
reference_url https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
reference_id http-addr.c#L229-L240
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
12
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
13
reference_url https://access.redhat.com/errata/RHSA-2024:4265
reference_id RHSA-2024:4265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4265
14
reference_url https://access.redhat.com/errata/RHSA-2024:4580
reference_id RHSA-2024:4580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4580
15
reference_url https://access.redhat.com/errata/RHSA-2024:4715
reference_id RHSA-2024:4715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4715
16
reference_url https://access.redhat.com/errata/RHSA-2024:4776
reference_id RHSA-2024:4776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4776
17
reference_url https://access.redhat.com/errata/RHSA-2024:5644
reference_id RHSA-2024:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5644
18
reference_url https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
reference_id user-tmp#n21
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/
url https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
19
reference_url https://usn.ubuntu.com/6844-1/
reference_id USN-6844-1
reference_type
scores
url https://usn.ubuntu.com/6844-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2024-35235
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc
13
url VCID-p8gy-dd3u-uqh4
vulnerability_id VCID-p8gy-dd3u-uqh4
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26691
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09443
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09492
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10972
published_at 2026-04-09T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10974
published_at 2026-04-11T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10942
published_at 2026-04-12T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10918
published_at 2026-04-13T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.10782
published_at 2026-04-16T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10796
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10841
published_at 2026-04-07T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10917
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c
reference_id
reference_type
scores
url https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c
5
reference_url https://support.apple.com/en-us/HT213183
reference_id
reference_type
scores
url https://support.apple.com/en-us/HT213183
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769
reference_id 1011769
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084321
reference_id 2084321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084321
8
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
9
reference_url https://access.redhat.com/errata/RHSA-2022:4990
reference_id RHSA-2022:4990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4990
10
reference_url https://access.redhat.com/errata/RHSA-2022:5054
reference_id RHSA-2022:5054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5054
11
reference_url https://access.redhat.com/errata/RHSA-2022:5055
reference_id RHSA-2022:5055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5055
12
reference_url https://access.redhat.com/errata/RHSA-2022:5056
reference_id RHSA-2022:5056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5056
13
reference_url https://access.redhat.com/errata/RHSA-2022:5057
reference_id RHSA-2022:5057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5057
14
reference_url https://usn.ubuntu.com/5454-1/
reference_id USN-5454-1
reference_type
scores
url https://usn.ubuntu.com/5454-1/
15
reference_url https://usn.ubuntu.com/5454-2/
reference_id USN-5454-2
reference_type
scores
url https://usn.ubuntu.com/5454-2/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
1
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2022-26691, MNDT-2022-0026
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4
14
url VCID-pwkd-sgtt-1bef
vulnerability_id VCID-pwkd-sgtt-1bef
summary cups: DNS rebinding attacks via incorrect whitelist
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18190
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71939
published_at 2026-04-01T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71981
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72017
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-12T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71985
published_at 2026-04-13T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-16T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1546395
reference_id 1546395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1546395
5
reference_url https://access.redhat.com/errata/RHSA-2020:3864
reference_id RHSA-2020:3864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3864
6
reference_url https://usn.ubuntu.com/3577-1/
reference_id USN-3577-1
reference_type
scores
url https://usn.ubuntu.com/3577-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-18190
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef
15
url VCID-q8a8-fd7r-1kg7
vulnerability_id VCID-q8a8-fd7r-1kg7
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32324
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46866
published_at 2026-04-02T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.4683
published_at 2026-04-07T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46883
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46885
published_at 2026-04-08T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-09T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46907
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.4688
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46887
published_at 2026-04-13T12:55:00Z
8
value 0.00259
scoring_system epss
scoring_elements 0.49279
published_at 2026-04-16T12:55:00Z
9
value 0.00259
scoring_system epss
scoring_elements 0.49276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209603
reference_id 2209603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209603
5
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
reference_id GHSA-cxc6-w2g7-69p7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
6
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
7
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html
8
reference_url https://access.redhat.com/errata/RHSA-2023:6596
reference_id RHSA-2023:6596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6596
9
reference_url https://access.redhat.com/errata/RHSA-2023:7165
reference_id RHSA-2023:7165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7165
10
reference_url https://access.redhat.com/errata/RHSA-2024:1101
reference_id RHSA-2024:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1101
11
reference_url https://access.redhat.com/errata/RHSA-2024:1409
reference_id RHSA-2024:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1409
12
reference_url https://usn.ubuntu.com/6128-1/
reference_id USN-6128-1
reference_type
scores
url https://usn.ubuntu.com/6128-1/
13
reference_url https://usn.ubuntu.com/6128-2/
reference_id USN-6128-2
reference_type
scores
url https://usn.ubuntu.com/6128-2/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-32324
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7
16
url VCID-qxwq-vp9g-ukca
vulnerability_id VCID-qxwq-vp9g-ukca
summary In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2180
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03824
published_at 2026-04-16T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0383
published_at 2026-04-01T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03868
published_at 2026-04-02T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03878
published_at 2026-04-04T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03892
published_at 2026-04-07T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03897
published_at 2026-04-08T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03922
published_at 2026-04-09T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.0389
published_at 2026-04-11T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03871
published_at 2026-04-12T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03845
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2180
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180
2
reference_url https://source.android.com/security/bulletin/2019-09-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2019-09-01
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
reference_id 934957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2180
reference_id CVE-2019-2180
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2180
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-2180
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca
17
url VCID-vx54-r2dt-8ue5
vulnerability_id VCID-vx54-r2dt-8ue5
summary Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4504
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10426
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10307
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10494
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10354
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10427
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10491
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10522
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10466
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10334
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4504
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238509
reference_id 2238509
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238509
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
reference_id 5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
reference_id 5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
reference_id AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
8
reference_url https://takeonme.org/cves/CVE-2023-4504.html
reference_id CVE-2023-4504.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://takeonme.org/cves/CVE-2023-4504.html
9
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
reference_id GHSA-4f65-6ph5-qwh6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
10
reference_url https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
reference_id GHSA-pf5r-86w9-678h
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
11
reference_url https://security.gentoo.org/glsa/202402-17
reference_id GLSA-202402-17
reference_type
scores
url https://security.gentoo.org/glsa/202402-17
12
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
reference_id msg00041.html
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
reference_id PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
reference_id T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
15
reference_url https://usn.ubuntu.com/6391-1/
reference_id USN-6391-1
reference_type
scores
url https://usn.ubuntu.com/6391-1/
16
reference_url https://usn.ubuntu.com/6391-2/
reference_id USN-6391-2
reference_type
scores
url https://usn.ubuntu.com/6391-2/
17
reference_url https://usn.ubuntu.com/6392-1/
reference_id USN-6392-1
reference_type
scores
url https://usn.ubuntu.com/6392-1/
18
reference_url https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
reference_id v2.4.7
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/
url https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2023-4504
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5
18
url VCID-w17y-dvuq-7ba6
vulnerability_id VCID-w17y-dvuq-7ba6
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4181
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27942
published_at 2026-04-18T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-13T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27959
published_at 2026-04-16T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-01T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39493
published_at 2026-04-02T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39517
published_at 2026-04-04T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39431
published_at 2026-04-07T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39486
published_at 2026-04-08T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39501
published_at 2026-04-09T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39512
published_at 2026-04-11T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39474
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
8
reference_url https://support.apple.com/HT208849
reference_id
reference_type
scores
url https://support.apple.com/HT208849
9
reference_url https://www.debian.org/security/2018/dsa-4243
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4243
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607291
reference_id 1607291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607291
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4181
reference_id CVE-2018-4181
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-4181
19
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
20
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
21
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4181
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6
19
url VCID-wqu4-wys6-hfbb
vulnerability_id VCID-wqu4-wys6-hfbb
summary cups: stack-buffer-overflow in libcups's asn1_get_type function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8675
reference_id
reference_type
scores
0
value 0.01419
scoring_system epss
scoring_elements 0.80524
published_at 2026-04-01T12:55:00Z
1
value 0.01419
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-02T12:55:00Z
2
value 0.01419
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-04T12:55:00Z
3
value 0.01419
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-07T12:55:00Z
4
value 0.01419
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-08T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-09T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80601
published_at 2026-04-11T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-12T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80579
published_at 2026-04-13T12:55:00Z
9
value 0.01419
scoring_system epss
scoring_elements 0.80607
published_at 2026-04-16T12:55:00Z
10
value 0.01419
scoring_system epss
scoring_elements 0.8061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8675
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1738455
reference_id 1738455
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1738455
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
reference_id 934957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
6
reference_url https://access.redhat.com/errata/RHSA-2020:1765
reference_id RHSA-2020:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1765
7
reference_url https://access.redhat.com/errata/RHSA-2020:3864
reference_id RHSA-2020:3864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3864
8
reference_url https://usn.ubuntu.com/4105-1/
reference_id USN-4105-1
reference_type
scores
url https://usn.ubuntu.com/4105-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-8675
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb
20
url VCID-zjj3-g2d7-c3gd
vulnerability_id VCID-zjj3-g2d7-c3gd
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15400
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.6126
published_at 2026-04-01T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.6134
published_at 2026-04-02T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-04T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61338
published_at 2026-04-07T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61385
published_at 2026-04-08T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-09T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-11T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61407
published_at 2026-04-12T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61388
published_at 2026-04-13T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61427
published_at 2026-04-16T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607288
reference_id 1607288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607288
8
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-15400
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd
21
url VCID-zt43-htwu-kfde
vulnerability_id VCID-zt43-htwu-kfde
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6553
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.34985
published_at 2026-04-01T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35183
published_at 2026-04-02T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35212
published_at 2026-04-04T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35093
published_at 2026-04-07T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35137
published_at 2026-04-08T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35163
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35168
published_at 2026-04-11T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35133
published_at 2026-04-12T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35108
published_at 2026-04-13T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35145
published_at 2026-04-16T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607285
reference_id 1607285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607285
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605
reference_id 903605
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605
8
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
9
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-6553
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde
22
url VCID-zxp7-6d69-tfhm
vulnerability_id VCID-zxp7-6d69-tfhm
summary cups: stack-buffer-overflow in libcups's asn1_get_packed function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-8696
reference_id
reference_type
scores
0
value 0.01419
scoring_system epss
scoring_elements 0.80524
published_at 2026-04-01T12:55:00Z
1
value 0.01419
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-02T12:55:00Z
2
value 0.01419
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-04T12:55:00Z
3
value 0.01419
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-07T12:55:00Z
4
value 0.01419
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-08T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-09T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80601
published_at 2026-04-11T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-12T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80579
published_at 2026-04-13T12:55:00Z
9
value 0.01419
scoring_system epss
scoring_elements 0.80607
published_at 2026-04-16T12:55:00Z
10
value 0.01419
scoring_system epss
scoring_elements 0.8061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-8696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1738497
reference_id 1738497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1738497
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
reference_id 934957
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957
6
reference_url https://access.redhat.com/errata/RHSA-2020:1765
reference_id RHSA-2020:1765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1765
7
reference_url https://access.redhat.com/errata/RHSA-2020:3864
reference_id RHSA-2020:3864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3864
8
reference_url https://usn.ubuntu.com/4105-1/
reference_id USN-4105-1
reference_type
scores
url https://usn.ubuntu.com/4105-1/
fixed_packages
0
url pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
purl pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3etj-2m21-ffa1
1
vulnerability VCID-63fa-a4pr-wqh3
2
vulnerability VCID-993k-m3sq-gufu
3
vulnerability VCID-am36-6m5v-fkba
4
vulnerability VCID-b1yf-xuc1-ykak
5
vulnerability VCID-dx89-e1nn-w7gz
6
vulnerability VCID-hc4t-becn-rkcc
7
vulnerability VCID-jy1y-e1nk-p3b4
8
vulnerability VCID-r1q4-2dq2-33ca
9
vulnerability VCID-ry9y-z4e4-yfdh
10
vulnerability VCID-vgtp-sjtt-73e9
11
vulnerability VCID-wr17-e776-bqh1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8
aliases CVE-2019-8696
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm
Fixing_vulnerabilities
0
url VCID-bzht-vhe3-y7bf
vulnerability_id VCID-bzht-vhe3-y7bf
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4180
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30171
published_at 2026-04-18T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30176
published_at 2026-04-13T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.3019
published_at 2026-04-16T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40864
published_at 2026-04-01T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40946
published_at 2026-04-02T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40975
published_at 2026-04-11T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.409
published_at 2026-04-07T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.4095
published_at 2026-04-08T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40957
published_at 2026-04-09T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40939
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
8
reference_url https://support.apple.com/HT208849
reference_id
reference_type
scores
url https://support.apple.com/HT208849
9
reference_url https://www.debian.org/security/2018/dsa-4243
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4243
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607282
reference_id 1607282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607282
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4180
reference_id CVE-2018-4180
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-4180
18
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
19
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
20
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4180
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf
1
url VCID-w17y-dvuq-7ba6
vulnerability_id VCID-w17y-dvuq-7ba6
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4181
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27942
published_at 2026-04-18T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27951
published_at 2026-04-13T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27959
published_at 2026-04-16T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-01T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39493
published_at 2026-04-02T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39517
published_at 2026-04-04T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39431
published_at 2026-04-07T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39486
published_at 2026-04-08T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39501
published_at 2026-04-09T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39512
published_at 2026-04-11T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39474
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
8
reference_url https://support.apple.com/HT208849
reference_id
reference_type
scores
url https://support.apple.com/HT208849
9
reference_url https://www.debian.org/security/2018/dsa-4243
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4243
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607291
reference_id 1607291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607291
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4181
reference_id CVE-2018-4181
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-4181
19
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
20
reference_url https://access.redhat.com/errata/RHSA-2020:1050
reference_id RHSA-2020:1050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1050
21
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-4181
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6
2
url VCID-zjj3-g2d7-c3gd
vulnerability_id VCID-zjj3-g2d7-c3gd
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15400
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.6126
published_at 2026-04-01T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.6134
published_at 2026-04-02T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-04T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61338
published_at 2026-04-07T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61385
published_at 2026-04-08T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-09T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61422
published_at 2026-04-11T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61407
published_at 2026-04-12T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61388
published_at 2026-04-13T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61427
published_at 2026-04-16T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607288
reference_id 1607288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607288
8
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2017-15400
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd
3
url VCID-zt43-htwu-kfde
vulnerability_id VCID-zt43-htwu-kfde
summary
Multiple vulnerabilities have been found in CUPS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6553
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.34985
published_at 2026-04-01T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35183
published_at 2026-04-02T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35212
published_at 2026-04-04T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35093
published_at 2026-04-07T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35137
published_at 2026-04-08T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35163
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35168
published_at 2026-04-11T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35133
published_at 2026-04-12T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35108
published_at 2026-04-13T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35145
published_at 2026-04-16T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1607285
reference_id 1607285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1607285
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605
reference_id 903605
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605
8
reference_url https://security.gentoo.org/glsa/201908-08
reference_id GLSA-201908-08
reference_type
scores
url https://security.gentoo.org/glsa/201908-08
9
reference_url https://usn.ubuntu.com/3713-1/
reference_id USN-3713-1
reference_type
scores
url https://usn.ubuntu.com/3713-1/
fixed_packages
0
url pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
purl pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-6mus-21kz-uuhz
4
vulnerability VCID-7wg4-sc9v-bffk
5
vulnerability VCID-993k-m3sq-gufu
6
vulnerability VCID-am36-6m5v-fkba
7
vulnerability VCID-apyh-1uza-pffa
8
vulnerability VCID-aznw-8yer-xfhf
9
vulnerability VCID-bzht-vhe3-y7bf
10
vulnerability VCID-ev9c-v5dv-37fb
11
vulnerability VCID-fkyp-m1p9-mfhy
12
vulnerability VCID-k4yw-jg6v-1bcc
13
vulnerability VCID-p8gy-dd3u-uqh4
14
vulnerability VCID-pwkd-sgtt-1bef
15
vulnerability VCID-q8a8-fd7r-1kg7
16
vulnerability VCID-qxwq-vp9g-ukca
17
vulnerability VCID-vx54-r2dt-8ue5
18
vulnerability VCID-w17y-dvuq-7ba6
19
vulnerability VCID-wqu4-wys6-hfbb
20
vulnerability VCID-zjj3-g2d7-c3gd
21
vulnerability VCID-zt43-htwu-kfde
22
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6
1
url pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
purl pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2chf-23mc-d3dn
1
vulnerability VCID-3etj-2m21-ffa1
2
vulnerability VCID-44ju-8618-vqht
3
vulnerability VCID-7wg4-sc9v-bffk
4
vulnerability VCID-993k-m3sq-gufu
5
vulnerability VCID-am36-6m5v-fkba
6
vulnerability VCID-apyh-1uza-pffa
7
vulnerability VCID-aznw-8yer-xfhf
8
vulnerability VCID-ev9c-v5dv-37fb
9
vulnerability VCID-k4yw-jg6v-1bcc
10
vulnerability VCID-p8gy-dd3u-uqh4
11
vulnerability VCID-q8a8-fd7r-1kg7
12
vulnerability VCID-qxwq-vp9g-ukca
13
vulnerability VCID-vx54-r2dt-8ue5
14
vulnerability VCID-wqu4-wys6-hfbb
15
vulnerability VCID-zxp7-6d69-tfhm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6
aliases CVE-2018-6553
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6